Information Security Leader, Author, Instructor and Speaker

Default utility Image

Cybersecurity Threats: Eight Things CIOs Need to Know TAGS: “It’s no secret that cybersecurity adversaries have become increasingly sophisticated over the past few years,” says Mike Chapple, adjunct research …Continue reading →

Default utility Image

Why You Should Conduct Risk Assessments Before Buying New Cybersecurity Products TAGS: The worldwide market for cybersecurity products and services will surpass $95 billion this year, according to Gartner. That’s a staggering …Continue reading →

Default utility Image

An old exam format is making an IT certification comeback TAGS: | In a quiet announcement last year, cybersecurity industry association (ISC)² made a major change to its long-established flagship testing program. Starting …Continue reading →

Default utility Image

Iran Doesn’t Have Nukes Yet, But It Has a Powerful Weapon It Can Use Right Now TAGS: This week’s collapse of the Iranian nuclear deal justifiably caused global consternation at the thought of Iran moving closer to becoming a nuclear power. …Continue reading →

Default utility Image

Cybersecurity Insurance: Five Things CIOs and Businesses Need to Know TAGS: This IDC Perspective identifies five crucial principles that IT executives must understand about the use of cybersecurity insurance to transfer …Continue reading →

Default utility Image

How to Really Protect Your Digital Privacy: Move to Europe TAGS: | Facebook CEO Mark Zuckerberg’s testimony before Congress last week highlighted the burgeoning importance of digital privacy in the minds of …Continue reading →

Default utility Image

Segment Your Campus Network for Stronger Security TAGS: | Campus networks carry almost every type of network traffic imaginable. Faculty and staff computers are similar to the devices in …Continue reading →

Default utility Image

Feds Can Optimize Disaster Recovery Solutions in the Cloud TAGS: | Every IT leader shares this nightmare: critical systems down, users enraged, data lost. Without reliable and timely access to data, political …Continue reading →

Default utility Image

Encryption: Six Principles That CIOs Need to Know TAGS: “Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. …Continue reading →

Default utility Image

It’s Time to Question Longstanding Password Security Best Practices TAGS: | Nobody likes password policies. IT leaders dislike reminding users to yet again change their passwords, then bracing for an onslaught of angry …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple